Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systems biology of energy homeostasis in yeast., , and . Current opinion in microbiology, (May 1, 2010)A Sequential Learning Approach for Single Hidden Layer Neural Networks., and . Neural Networks, 11 (1): 65-80 (1998)Classifying Force Spectroscopy of DNA Pulling Measurements Using Supervised and Unsupervised Machine Learning Methods., , , and . Journal of Chemical Information and Modeling, 56 (4): 621-629 (2016)Recognition of Comparative Sentences from Online Reviews Based on Multi-feature Item Combinations., , , and . ICIC (2), volume 10955 of Lecture Notes in Computer Science, page 182-193. Springer, (2018)A Simple But Effective Method to Incorporate Trusted Neighbors in Recommender Systems., , and . UMAP, volume 7379 of Lecture Notes in Computer Science, page 114-125. Springer, (2012)A Framework for Modeling Trustworthiness of Users in Mobile Vehicular Ad-Hoc Networks and Its Validation through Simulated Traffic Flow., , , , and . UMAP, volume 7379 of Lecture Notes in Computer Science, page 76-87. Springer, (2012)Batch-to-Batch Optimal Control Based on Support Vector Regression Model., , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 125-130. Springer, (2005)Recommending Messages to Users in Social Networks: A Cross-Site Study., , , , , , , , and . ICMLA (2), page 445-450. IEEE, (2013)978-0-7695-5144-9.Research on Aesthetics Degree Optimization Model of Product Form., , and . HCI (6), volume 11571 of Lecture Notes in Computer Science, page 200-213. Springer, (2019)Value Combination Technique for Image Authentication., , , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 276-285. Springer, (2007)